mirror of https://github.com/status-im/consul.git
275 lines
7.1 KiB
Go
275 lines
7.1 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package catalogv2
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
pbauth "github.com/hashicorp/consul/proto-public/pbauth/v2beta1"
|
|
"github.com/hashicorp/consul/proto-public/pbresource"
|
|
libassert "github.com/hashicorp/consul/test/integration/consul-container/libs/assert"
|
|
"github.com/hashicorp/consul/test/integration/consul-container/libs/utils"
|
|
"github.com/hashicorp/consul/testing/deployer/sprawl/sprawltest"
|
|
"github.com/hashicorp/consul/testing/deployer/topology"
|
|
|
|
"github.com/hashicorp/consul/test-integ/topoutil"
|
|
)
|
|
|
|
// TestBasicL4ExplicitDestinations sets up the following:
|
|
//
|
|
// - 1 cluster (no peering / no wanfed)
|
|
// - 3 servers in that cluster
|
|
// - v2 arch is activated
|
|
// - for each tenancy, only using v2 constructs:
|
|
// - a client with one explicit destination to a single port service
|
|
// - a client with multiple explicit destinations to multiple ports of the
|
|
// same multiport service
|
|
//
|
|
// When this test is executed in CE it will only use the default/default
|
|
// tenancy.
|
|
//
|
|
// When this test is executed in Enterprise it will additionally test the same
|
|
// things within these tenancies:
|
|
//
|
|
// - part1/default
|
|
// - default/nsa
|
|
// - part1/nsa
|
|
func TestBasicL4ExplicitDestinations(t *testing.T) {
|
|
cfg := testBasicL4ExplicitDestinationsCreator{}.NewConfig(t)
|
|
|
|
sp := sprawltest.Launch(t, cfg)
|
|
|
|
var (
|
|
asserter = topoutil.NewAsserter(sp)
|
|
|
|
topo = sp.Topology()
|
|
cluster = topo.Clusters["dc1"]
|
|
|
|
ships = topo.ComputeRelationships()
|
|
)
|
|
|
|
clientV2 := sp.ResourceServiceClientForCluster(cluster.Name)
|
|
|
|
t.Log(topology.RenderRelationships(ships))
|
|
|
|
// Make sure things are in v2.
|
|
for _, name := range []string{
|
|
"single-server",
|
|
"single-client",
|
|
"multi-server",
|
|
"multi-client",
|
|
} {
|
|
libassert.CatalogV2ServiceHasEndpointCount(t, clientV2, name, nil, 1)
|
|
}
|
|
|
|
// Check relationships
|
|
for _, ship := range ships {
|
|
t.Run("relationship: "+ship.String(), func(t *testing.T) {
|
|
var (
|
|
wrk = ship.Caller
|
|
dest = ship.Destination
|
|
)
|
|
|
|
clusterPrefix := clusterPrefixForDestination(dest)
|
|
|
|
asserter.DestinationEndpointStatus(t, wrk, clusterPrefix+".", "HEALTHY", 1)
|
|
asserter.HTTPServiceEchoes(t, wrk, dest.LocalPort, "")
|
|
asserter.FortioFetch2FortioName(t, wrk, dest, cluster.Name, dest.ID)
|
|
})
|
|
}
|
|
}
|
|
|
|
type testBasicL4ExplicitDestinationsCreator struct{}
|
|
|
|
func (c testBasicL4ExplicitDestinationsCreator) NewConfig(t *testing.T) *topology.Config {
|
|
const clusterName = "dc1"
|
|
|
|
servers := topoutil.NewTopologyServerSet(clusterName+"-server", 3, []string{clusterName, "wan"}, nil)
|
|
|
|
cluster := &topology.Cluster{
|
|
Enterprise: utils.IsEnterprise(),
|
|
Name: clusterName,
|
|
Nodes: servers,
|
|
}
|
|
|
|
lastNode := 0
|
|
nodeName := func() string {
|
|
lastNode++
|
|
return fmt.Sprintf("%s-box%d", clusterName, lastNode)
|
|
}
|
|
|
|
c.topologyConfigAddNodes(t, cluster, nodeName, "default", "default")
|
|
if cluster.Enterprise {
|
|
c.topologyConfigAddNodes(t, cluster, nodeName, "part1", "default")
|
|
c.topologyConfigAddNodes(t, cluster, nodeName, "part1", "nsa")
|
|
c.topologyConfigAddNodes(t, cluster, nodeName, "default", "nsa")
|
|
}
|
|
|
|
return &topology.Config{
|
|
Images: utils.TargetImages(),
|
|
Networks: []*topology.Network{
|
|
{Name: clusterName},
|
|
{Name: "wan", Type: "wan"},
|
|
},
|
|
Clusters: []*topology.Cluster{
|
|
cluster,
|
|
},
|
|
}
|
|
}
|
|
|
|
func (c testBasicL4ExplicitDestinationsCreator) topologyConfigAddNodes(
|
|
t *testing.T,
|
|
cluster *topology.Cluster,
|
|
nodeName func() string,
|
|
partition,
|
|
namespace string,
|
|
) {
|
|
clusterName := cluster.Name
|
|
|
|
newID := func(name string) topology.ID {
|
|
return topology.ID{
|
|
Partition: partition,
|
|
Namespace: namespace,
|
|
Name: name,
|
|
}
|
|
}
|
|
|
|
tenancy := &pbresource.Tenancy{
|
|
Partition: partition,
|
|
Namespace: namespace,
|
|
PeerName: "local",
|
|
}
|
|
|
|
singleportServerNode := &topology.Node{
|
|
Kind: topology.NodeKindDataplane,
|
|
Version: topology.NodeVersionV2,
|
|
Partition: partition,
|
|
Name: nodeName(),
|
|
Workloads: []*topology.Workload{
|
|
topoutil.NewFortioWorkloadWithDefaults(
|
|
clusterName,
|
|
newID("single-server"),
|
|
topology.NodeVersionV2,
|
|
nil,
|
|
),
|
|
},
|
|
}
|
|
singleportClientNode := &topology.Node{
|
|
Kind: topology.NodeKindDataplane,
|
|
Version: topology.NodeVersionV2,
|
|
Partition: partition,
|
|
Name: nodeName(),
|
|
Workloads: []*topology.Workload{
|
|
topoutil.NewFortioWorkloadWithDefaults(
|
|
clusterName,
|
|
newID("single-client"),
|
|
topology.NodeVersionV2,
|
|
func(wrk *topology.Workload) {
|
|
delete(wrk.Ports, "grpc") // v2 mode turns this on, so turn it off
|
|
delete(wrk.Ports, "http2") // v2 mode turns this on, so turn it off
|
|
wrk.Destinations = []*topology.Destination{{
|
|
ID: newID("single-server"),
|
|
PortName: "http",
|
|
LocalAddress: "0.0.0.0", // needed for an assertion
|
|
LocalPort: 5000,
|
|
}}
|
|
},
|
|
),
|
|
},
|
|
}
|
|
singleportTrafficPerms := sprawltest.MustSetResourceData(t, &pbresource.Resource{
|
|
Id: &pbresource.ID{
|
|
Type: pbauth.TrafficPermissionsType,
|
|
Name: "single-server-perms",
|
|
Tenancy: tenancy,
|
|
},
|
|
}, &pbauth.TrafficPermissions{
|
|
Destination: &pbauth.Destination{
|
|
IdentityName: "single-server",
|
|
},
|
|
Action: pbauth.Action_ACTION_ALLOW,
|
|
Permissions: []*pbauth.Permission{{
|
|
Sources: []*pbauth.Source{{
|
|
IdentityName: "single-client",
|
|
Namespace: namespace,
|
|
}},
|
|
}},
|
|
})
|
|
|
|
multiportServerNode := &topology.Node{
|
|
Kind: topology.NodeKindDataplane,
|
|
Version: topology.NodeVersionV2,
|
|
Partition: partition,
|
|
Name: nodeName(),
|
|
Workloads: []*topology.Workload{
|
|
topoutil.NewFortioWorkloadWithDefaults(
|
|
clusterName,
|
|
newID("multi-server"),
|
|
topology.NodeVersionV2,
|
|
nil,
|
|
),
|
|
},
|
|
}
|
|
multiportClientNode := &topology.Node{
|
|
Kind: topology.NodeKindDataplane,
|
|
Version: topology.NodeVersionV2,
|
|
Partition: partition,
|
|
Name: nodeName(),
|
|
Workloads: []*topology.Workload{
|
|
topoutil.NewFortioWorkloadWithDefaults(
|
|
clusterName,
|
|
newID("multi-client"),
|
|
topology.NodeVersionV2,
|
|
func(wrk *topology.Workload) {
|
|
wrk.Destinations = []*topology.Destination{
|
|
{
|
|
ID: newID("multi-server"),
|
|
PortName: "http",
|
|
LocalAddress: "0.0.0.0", // needed for an assertion
|
|
LocalPort: 5000,
|
|
},
|
|
{
|
|
ID: newID("multi-server"),
|
|
PortName: "http2",
|
|
LocalAddress: "0.0.0.0", // needed for an assertion
|
|
LocalPort: 5001,
|
|
},
|
|
}
|
|
},
|
|
),
|
|
},
|
|
}
|
|
multiportTrafficPerms := sprawltest.MustSetResourceData(t, &pbresource.Resource{
|
|
Id: &pbresource.ID{
|
|
Type: pbauth.TrafficPermissionsType,
|
|
Name: "multi-server-perms",
|
|
Tenancy: tenancy,
|
|
},
|
|
}, &pbauth.TrafficPermissions{
|
|
Destination: &pbauth.Destination{
|
|
IdentityName: "multi-server",
|
|
},
|
|
Action: pbauth.Action_ACTION_ALLOW,
|
|
Permissions: []*pbauth.Permission{{
|
|
Sources: []*pbauth.Source{{
|
|
IdentityName: "multi-client",
|
|
Namespace: namespace,
|
|
}},
|
|
}},
|
|
})
|
|
|
|
cluster.Nodes = append(cluster.Nodes,
|
|
singleportClientNode,
|
|
singleportServerNode,
|
|
multiportClientNode,
|
|
multiportServerNode,
|
|
)
|
|
|
|
cluster.InitialResources = append(cluster.InitialResources,
|
|
singleportTrafficPerms,
|
|
multiportTrafficPerms,
|
|
)
|
|
}
|